CVE-2025-14134
Published: 06 December 2025
Summary
CVE-2025-14134 is a high-severity Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119) vulnerability in Linksys Re6500 Firmware. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 40.9% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Validates the clientsname_0 argument to prevent stack-based buffer overflows from malformed or oversized inputs in the mod_form.so function.
Implements memory safeguards like stack canaries, ASLR, and non-executable memory to block exploitation of the stack-based buffer overflow.
Requires timely identification, reporting, and correction of the buffer overflow flaw in affected Linksys firmware versions.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Stack-based buffer overflow in the remote web interface function RE2000v2Repeater_get_wireless_clientlist_setClientsName (mod_form.so) enables remote code execution via exploitation of a public-facing application.
NVD Description
A vulnerability was determined in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Affected by this issue is the function RE2000v2Repeater_get_wireless_clientlist_setClientsName of the file mod_form.so. Executing manipulation of the argument clientsname_0 can lead to stack-based buffer overflow. The attack…
more
can be launched remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Deeper analysisAI
CVE-2025-14134 is a stack-based buffer overflow vulnerability in the RE2000v2Repeater_get_wireless_clientlist_setClientsName function of the mod_form.so file. It affects Linksys Wi-Fi range extenders, specifically models RE6500, RE6250, RE6300, RE6350, RE7000, and RE9000 running firmware versions 1.0.013.001, 1.0.04.001, 1.0.04.002, 1.1.05.003, and 1.2.07.001.
The vulnerability is exploitable remotely over the network by an attacker with low privileges, requiring low attack complexity and no user interaction. Manipulation of the clientsname_0 argument triggers the buffer overflow, enabling high-impact consequences including unauthorized access to confidential data, modification of system integrity, and denial of service, as scored at CVSS 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
Advisories from VulDB and referenced GitHub repositories disclose a publicly available proof-of-concept exploit but note no response from the vendor despite early notification, with no patches or mitigations provided. Security practitioners should isolate affected devices and monitor for exploitation attempts detailed in the references.
The exploit has been publicly disclosed and may be utilized, with root causes tied to CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) and CWE-121 (Stack-based Buffer Overflow).
Details
- CWE(s)